MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 30efd997c49aae97766539c72d72529b06f1e8522ea84e71758cde4ed1846921. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 30efd997c49aae97766539c72d72529b06f1e8522ea84e71758cde4ed1846921
SHA3-384 hash: d5b3f6612a1696bf4fac77fa60fa28ba87d4227688dd06627b8c3276be8e33c3a2dbbc3000553e22973935f77165ec8c
SHA1 hash: 0f0be2cc28769ae61380f7ced287c37fe4912c02
MD5 hash: c833ae00d46ea45681b476c749d18ec8
humanhash: winner-lithium-white-lactose
File name:Atrofierendes4.exe
Download: download sample
Signature GuLoader
File size:77'824 bytes
First seen:2020-06-02 11:09:37 UTC
Last seen:2020-06-02 11:32:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b19f388bc61b9221e1e97c4b680bf0ca (1 x GuLoader)
ssdeep 768:J0Khc7416N8lBR2zI4Bk2Yukmzq7aBo227SkqcHQ568Rq1SJUYOFd7S+:eKFO8lLaya19BwqH68Rq1S9s
Threatray 5'085 similar samples on MalwareBazaar
TLSH 217349176D088E11D9B046701CA787AD2F16BC4C868A5E5F384E6E1BFF323B16C9D61D
Reporter abuse_ch
Tags:exe GuLoader WHO


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: smtpgate04.genotec.ch
Sending IP: 81.221.254.53
From: resourceteam@worldhealth.org
Reply-To: victoria_bannister2009@hotmail.com
Subject: INTENTION FOR EXPRESSION OF INTEREST: WHO/2020/06/02/AA1
Attachment: world health organization proposal file.zip (contains "Atrofierendes4.exe")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1wOlpmTA15MUHYuQiL4QonKzdP6YMl5Hx

Intelligence


File Origin
# of uploads :
2
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Occamy
Status:
Malicious
First seen:
2020-06-02 22:00:00 UTC
AV detection:
15 of 31 (48.39%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 30efd997c49aae97766539c72d72529b06f1e8522ea84e71758cde4ed1846921

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments